| 1 | -- | 21 | Mahesh Patil, Shailaja C. Patil. A blended approach of static binary mining and exploratory data analysis to obtain the security posture of embedded systems firmware |
| 22 | -- | 40 | Zeng Shou, Yue-bin Di, Xiao Ma, Rui-chao Xu, Heqiu Chai, Long Yin. The APT family classification system based on APT call sequences and attention mechanism |
| 41 | -- | 67 | Miao He, Nurmamat Helil. A lattice-based CP-ABE scheme with immediate attribute revocation |
| 68 | -- | 90 | Moumita Sahoo, Sabyasachi Samanta, Soumen Ghosh. An ensemble classification model for improved performance of phishing detection system |
| 91 | -- | 108 | Junjing Zhu, HongGang Lin. Method for botnet detection with small labelled samples based on graph neural network |
| 109 | -- | 146 | Xian Guo, Kai Zheng, Yongbo Jiang, Jing Wang, Junli Fang 0001. Security-enhanced machine learning framework based on PATE |
| 147 | -- | 158 | Orkhan Valikhanli. Detection of malware in ground control stations of unmanned aerial vehicles based on image processing |
| 159 | -- | 177 | Nabila Sehito, Shouyi Yang, Raja Sohail Ahmed Larik, Ghulam Raza, Safi Ullah. Analysis of outage probability and optimising secrecy capacity in physical layer security based on wireless cooperative relay networks |